Get Started in AI CTFs
Netsec Explained
Get Started in AI CTFs
14:57
Real-world Attacks on LLM Applications
Netsec Explained
Real-world Attacks on LLM Applications
39:03
3 Things You Need to Know for Modern Application Hacking
Netsec Explained
3 Things You Need to Know for Modern Application Hacking
12:19
What Time is the 3 O' Clock Parade? | Soft Skills for Hackers
Netsec Explained
What Time is the 3 O' Clock Parade? | Soft Skills for Hackers
6:18
STRIDE Threat Modeling for Beginners - In 20 Minutes
Netsec Explained
STRIDE Threat Modeling for Beginners - In 20 Minutes
21:49
Little Known Web Hack for Quick Admin Access
Netsec Explained
Little Known Web Hack for Quick Admin Access
10:57
Master Burp Suite Like A Pro In Just 1 Hour
Netsec Explained
Master Burp Suite Like A Pro In Just 1 Hour
51:29
Hitting the Digital Wall - How to Deal With Burnout
Netsec Explained
Hitting the Digital Wall - How to Deal With Burnout
4:48
Pivot Through Multiple Networks | Master Network Pivoting
Netsec Explained
Pivot Through Multiple Networks | Master Network Pivoting
9:52
ChatGPT for Cybersecurity | Step-by-Step Guide
Netsec Explained
ChatGPT for Cybersecurity | Step-by-Step Guide
46:10
Tunneling Through Protected Networks | Master Network Pivoting
Netsec Explained
Tunneling Through Protected Networks | Master Network Pivoting
14:12
Full SQL Injection Tutorial | Episode 3: Blind SQL Injection A-Z
Netsec Explained
Full SQL Injection Tutorial | Episode 3: Blind SQL Injection A-Z
29:37
Full SQL Injection Tutorial | Episode 2: In-band SQL Injection
Netsec Explained
Full SQL Injection Tutorial | Episode 2: In-band SQL Injection
21:21
Full SQL Injection Tutorial | Episode 1: SQL Basics in 15 Minutes
Netsec Explained
Full SQL Injection Tutorial | Episode 1: SQL Basics in 15 Minutes
15:01
Cloud Pentesting - IAM Enumeration for Privilege Escalation
Netsec Explained
Cloud Pentesting - IAM Enumeration for Privilege Escalation
31:31
Advanced Local and Remote File Inclusion - PHP Wrappers
Netsec Explained
Advanced Local and Remote File Inclusion - PHP Wrappers
11:19
Bug Bounties with Bash
Netsec Explained
Bug Bounties with Bash
24:12
Bug Bounty and Pentesting with Docker
Netsec Explained
Bug Bounty and Pentesting with Docker
14:25
Exploit Java Deserialization | Exploiting JBoss 6.1.0
Netsec Explained
Exploit Java Deserialization | Exploiting JBoss 6.1.0
10:11
Exploit Java Deserialization | Discovering Insecure Deserialization
Netsec Explained
Exploit Java Deserialization | Discovering Insecure Deserialization
11:17
Exploit Java Deserialization | Understanding Serialized Data
Netsec Explained
Exploit Java Deserialization | Understanding Serialized Data
8:18
Top 10 Tips for Passing Your OSCP
Netsec Explained
Top 10 Tips for Passing Your OSCP
27:46
Advanced Nmap - Scanning Large Scale Networks
Netsec Explained
Advanced Nmap - Scanning Large Scale Networks
11:23
6 Types of Hackers That Don't Exist (and 5 More That Do)
Netsec Explained
6 Types of Hackers That Don't Exist (and 5 More That Do)
10:37
Machine Learning for Security Analysts - Part 3: Malicious URL Predictor
Netsec Explained
Machine Learning for Security Analysts - Part 3: Malicious URL Predictor
16:36
Machine Learning for Security Analysts - Part 2: Building a Spam Filter
Netsec Explained
Machine Learning for Security Analysts - Part 2: Building a Spam Filter
23:45
Machine Learning for Security Analysts - Part 1: The Machine Learning Process
Netsec Explained
Machine Learning for Security Analysts - Part 1: The Machine Learning Process
15:02
Advanced Wireshark Network Forensics - Part 3/3
Netsec Explained
Advanced Wireshark Network Forensics - Part 3/3
12:00
Advanced Wireshark Network Forensics - Part 2/3
Netsec Explained
Advanced Wireshark Network Forensics - Part 2/3
13:58
Advanced Wireshark Network Forensics - Part 1/3
Netsec Explained
Advanced Wireshark Network Forensics - Part 1/3
7:27
Web Hacker Basics 08 (Blind SQL Injection); featuring SQLmap
Netsec Explained
Web Hacker Basics 08 (Blind SQL Injection); featuring SQLmap
7:42
Web Hacker Basics 07 (CSRF); chaining attacks together
Netsec Explained
Web Hacker Basics 07 (CSRF); chaining attacks together
7:16
Web Hacker Basics 06 (Parameter Tampering); featuring Burp Proxy
Netsec Explained
Web Hacker Basics 06 (Parameter Tampering); featuring Burp Proxy
6:37
Web Hacker Basics 05 (Brute Forcing); featuring THC Hydra
Netsec Explained
Web Hacker Basics 05 (Brute Forcing); featuring THC Hydra
8:37
Web Hacker Basics 04 (Local and Remote File Inclusion)
Netsec Explained
Web Hacker Basics 04 (Local and Remote File Inclusion)
9:52
Web Hacker Basics 03 (Command Injection)
Netsec Explained
Web Hacker Basics 03 (Command Injection)
5:06
Web Hacker Basics 02 (XSS)
Netsec Explained
Web Hacker Basics 02 (XSS)
9:45
Web Hacker Basics 01 (SQL Injection)
Netsec Explained
Web Hacker Basics 01 (SQL Injection)
10:11
Building a Web Hacking Lab (w/ XAMPP and DVWA)
Netsec Explained
Building a Web Hacking Lab (w/ XAMPP and DVWA)
7:42
Web Hacker Basics 00 (Intro)
Netsec Explained
Web Hacker Basics 00 (Intro)
2:17